Literatura académica sobre el tema "Privacy"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Privacy".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Privacy"
Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality". University of Michigan Journal of Law Reform, n.º 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.
Texto completoCohen, Julie E. "Turning Privacy Inside Out". Theoretical Inquiries in Law 20, n.º 1 (16 de marzo de 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.
Texto completoLemley, Mark. "Privacy, Property, and Publicity". Michigan Law Review, n.º 117.6 (2019): 1153. http://dx.doi.org/10.36644/mlr.117.6.privacy.
Texto completoCulshaw, Helen. "Private sector libraries and privacy". ANZTLA EJournal, n.º 49 (29 de abril de 2019): 10–13. http://dx.doi.org/10.31046/anztla.v0i49.1196.
Texto completoMunro, Moira y Ruth Madigan. "Privacy in the private sphere". Housing Studies 8, n.º 1 (enero de 1993): 29–45. http://dx.doi.org/10.1080/02673039308720748.
Texto completoEtzioni, Amitai. "Privacy and the private realm". Innovation: The European Journal of Social Science Research 25, n.º 1 (marzo de 2012): 57–66. http://dx.doi.org/10.1080/13511610.2012.655574.
Texto completoDarr, Kurt. "Privacy—Private Lives, Public Lives". Hospital Topics 81, n.º 3 (enero de 2003): 29–32. http://dx.doi.org/10.1080/00185860309598025.
Texto completoBläser, Markus, Andreas Jakoby, Maciej Liśkiewicz y Bodo Manthey. "Privacy in Non-private Environments". Theory of Computing Systems 48, n.º 1 (16 de octubre de 2009): 211–45. http://dx.doi.org/10.1007/s00224-009-9243-1.
Texto completoNissim, Kobbi y Alexandra Wood. "Is privacy privacy ?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 376, n.º 2128 (6 de agosto de 2018): 20170358. http://dx.doi.org/10.1098/rsta.2017.0358.
Texto completoSari, Putri Widya. "Pengungkapan Diri dalam Perseteruan Youtuber Kembar Tasya Farasya dan Tasyi Athasyia". Jurnal Komunikasi Nusantara 5, n.º 1 (1 de junio de 2023): 67–77. http://dx.doi.org/10.33366/jkn.v5i1.244.
Texto completoTesis sobre el tema "Privacy"
Loesing, Karsten. "Privacy-enhancing technologies for private services". Bamberg Univ. of Bamberg Press, 2009. http://d-nb.info/994593937/34.
Texto completoRICCI, STEFANO. "Il global privacy standard: i modelli di tutela della privacy". Doctoral thesis, Università degli Studi di Milano-Bicocca, 2013. http://hdl.handle.net/10281/44620.
Texto completoThis work proposes an alternative account of data protection in terms of confidentiality: the argument is that confidentiality should have more relevance because it lights up the relationship between those who have information and those to whom the information relates. In fact, I argue that the deficit of understanding in data protection laws is due to an equivocal centrality of the need to safeguard an individualistic and general right of privacy as shield against arbitrary interference instead of a need to protect relationships of trust. Conceptualising data protection through confidentiality serves to point out the breaches of fiduciary duties. In contrast to the classic approach of privacy and data protection, confidentiality focuses on relationships rather than individuals because, far from a right to be let alone, confidentiality is based on the rules of trust within relationships: it is adequate to describe a breach of privacy through confidentiality as a breach of an implicit clause of a fiduciary relationship existing between the data controller (the confidant) and the data subject (the confider). Global Privacy Standard (GPS) and Fair Information Practises (FIPs) show a clearly delineated ground for personal data protection in the form of confidentiality. If GPS are understood not as creating a general right of privacy of personal data, but as carrying out the extremely different duty of confidentiality with respect to data protection, GPS can be seen not as attempting to regulate personal data based on the private nature of that information, but only establish the framework in which such information is exchanged. Data protection should therefore be separated from privacy and should put into a legal frame of confidentiality, so that personal data could be better protected.
Foerster, Marian. "WWW Privacy - P3P Platform of Privacy Preferencers". Universitätsbibliothek Chemnitz, 2000. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200000598.
Texto completoPurandare, Darshan. "ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY". Master's thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2998.
Texto completoM.S.
School of Computer Science
Engineering and Computer Science
Computer Science
WITTE, NATHAN ALLAN. "PRIVACY: ARCHITECTURE IN SUPPORT OF PRIVACY REGULATION". University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1053701814.
Texto completoWitte, Nathan. "Privacy architecture in support of privacy regulation /". Cincinnati, Ohio : University of Cincinnati, 2003. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1053701814.
Texto completoDe, Montjoye Yves-Alexandre. "Computational privacy : towards privacy-conscientious uses of metadata". Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101850.
Texto completoCataloged from PDF version of thesis.
Includes bibliographical references (pages 111-127).
The breadcrumbs left behind by our technologies have the power to fundamentally transform the health and development of societies. Metadata about our whereabouts, social lives, preferences, and finances can be used for good but can also be abused. In this thesis, I show that the richness of today's datasets have rendered traditional data protections strategies outdated, requiring us to deeply rethink our approach. First, I show that the concept of anonymization, central to legal and technical data protection frameworks, does not scale. I introduce the concept of unicity to study the risks of re-identification of large-scale metadata datasets given p points. I then use unicity to show that four spatio-temporal points are enough to uniquely identify 95% of people in a mobile phone dataset and 90% of people in a credit card dataset. In both cases, I also show that traditional de-identification strategies such as data generalization are not sufficient to approach anonymity in modern high-dimensional datasets. Second, I argue that the second pillar of data protection, risk assessment, is similarly crumbling as data gets richer. I show, for instance, how standard mobile phone data-information on how and when somebody calls or texts-can be used to predict personality traits up to 1.7 times better than random. The risk of inference in big data will render comprehensive risks assessments increasingly difficult and, moving forward, potentially irrelevant as they will require evaluating what can be inferred now, and in the future, from rich data. However, this data has a great potential for good especially in developing countries. While it is highly unlikely that we will ever find a magic bullet or even a one-size- fits-all approach to data protection, there are ways that exist to use metadata in privacy-conscientious ways. I finish this thesis by discussing technical solutions (incl. privacy-through-security ones) which, when combined with legal and regulatory frameworks, provide a reasonable balance between the imperative of using this data and the legitimate concerns of the individual and society.
by Yves-Alexandre de Montjoye.
Ph. D.
Sato, Keiko. "Privacy on the internet : Investigation into corporate privacy policy of Australian large private sector organisations on the internet". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1032.
Texto completoVéliz, Carissa. "On privacy". Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:afb31b0e-f022-48a6-b239-4c704cfd4484.
Texto completoBruggen, Harry van der. "Patiënt, privaat en privacy de stoelgang als gezondheidswetenschappelijk probleem /". Lochem : Maastricht : De Tijdstroom ; University Library, Maastricht University [Host], 1991. http://arno.unimaas.nl/show.cgi?fid=5616.
Texto completoLibros sobre el tema "Privacy"
Akhtar, Salman y Aisha Abbasi, eds. Privacy. New York : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429202278.
Texto completoFilimowicz, Michael. Privacy. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003173335.
Texto completoInstitute, Pennsylvania Bar. Privacy. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2005.
Buscar texto completoMerino, Noël. Privacy. Detroit: Greenhaven Press, A part of Gale, Cengage Learning, 2014.
Buscar texto completoRodriguez, Kenneth. Privacy. Calabasas, CA: Center for Civic Education, 2001.
Buscar texto completoAgostino, Clemente, ed. Privacy. Padova: CEDAM, 1999.
Buscar texto completoRaymond, Wacks, ed. Privacy. New York, NY: New York University Press, 1993.
Buscar texto completoKnopff, Rainer. Privacy. Calgary: The Calgary Institute for the Humanities, The University of Calgary, 1989.
Buscar texto completoRodriguez, Kenneth. Privacy. Calabasas, CA: Center for Civic Education, 2001.
Buscar texto completoScherer, Lauri S. Privacy. Detroit: Greenhaven Press, 2014.
Buscar texto completoCapítulos de libros sobre el tema "Privacy"
Dannen, Chris y Christopher White. "Privacy, Privacy, Privacy". En Beginning iOS Apps with Facebook and Twitter APIs, 9–14. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3543-9_2.
Texto completoKanterian, Edward. "Privacy and Private Language". En A Companion to Wittgenstein, 443–64. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118884607.ch28.
Texto completoChinwah-Adegbola, Lovette. "Privacy". En Portable Health Records in a Mobile Society, 87–100. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-19937-1_9.
Texto completoLevesque, Roger J. R. "Privacy". En Encyclopedia of Adolescence, 2161–64. New York, NY: Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4419-1695-2_708.
Texto completoPosner, Richard A. "Privacy". En The New Palgrave Dictionary of Economics and the Law, 1503–8. London: Palgrave Macmillan UK, 2002. http://dx.doi.org/10.1007/978-1-349-74173-1_287.
Texto completoHung, Patrick C. K. y Vivying S. Y. Cheng. "Privacy". En Encyclopedia of Database Systems, 1–2. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4899-7993-3_274-2.
Texto completoRosenoer, Jonathan. "Privacy". En CyberLaw, 129–60. New York, NY: Springer New York, 1997. http://dx.doi.org/10.1007/978-1-4612-4064-8_4.
Texto completoCofone, Ignacio N. "Privacy". En Encyclopedia of Law and Economics, 1644–48. New York, NY: Springer New York, 2019. http://dx.doi.org/10.1007/978-1-4614-7753-2_751.
Texto completoCofone, Ignacio N. "Privacy". En Encyclopedia of Law and Economics, 1–4. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-7883-6_751-1.
Texto completoSchreck, Jörg. "Privacy". En Security and Privacy in User Modeling, 17–25. Dordrecht: Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-017-0377-2_3.
Texto completoActas de conferencias sobre el tema "Privacy"
Bansal, Aman, Rahul Chunduru, Deepesh Data y Manoj Prabhakaran. "Utilitarian Privacy and Private Sampling". En 2024 IEEE International Symposium on Information Theory (ISIT), 392–97. IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619191.
Texto completoHemkumar, D. y Pvn Prashanth. "A Weighted Privacy Mechanism under Differential Privacy". En 2024 4th International Conference on Intelligent Technologies (CONIT), 1–6. IEEE, 2024. http://dx.doi.org/10.1109/conit61985.2024.10626770.
Texto completoShani, Guy. "Advances and Challenges in Privacy Preserving Planning". En Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/816.
Texto completoZhao, Wenhao, Shaoyang Song y Chunlai Zhou. "Generate Synthetic Text Approximating the Private Distribution with Differential Privacy". En Thirty-Third International Joint Conference on Artificial Intelligence {IJCAI-24}. California: International Joint Conferences on Artificial Intelligence Organization, 2024. http://dx.doi.org/10.24963/ijcai.2024/735.
Texto completo"THE PRIVACY ADVOCATE (PRIVAD) - A Framework for Negotiating Individual Privacy Contracts". En 3rd International Conference on Web Information Systems and Technologies. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0001282100880095.
Texto completoLiu, Hongbin, Jinyuan Jia y Neil Zhenqiang Gong. "On the Intrinsic Differential Privacy of Bagging". En Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/376.
Texto completoGu, He. "Towards Guaranteed Privacy in Stream Processing: Differential Privacy for Private Pattern Protection". En DEBS '23: 17th ACM International Conference on Distributed and Event-based Systems. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3583678.3603284.
Texto completoGajera, Hardik y Manik Lal Das. "Privc: Privacy Preserving Verifiable Computation". En 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS). IEEE, 2020. http://dx.doi.org/10.1109/comsnets48256.2020.9027488.
Texto completoInan, Ali, Murat Kantarcioglu, Gabriel Ghinita y Elisa Bertino. "Private record matching using differential privacy". En the 13th International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1739041.1739059.
Texto completoA. Hayek, Frederic, Mirko Koscina, Pascal Lafourcade y Charles Olivier-Anclin. "Generic Privacy Preserving Private Permissioned Blockchains". En SAC '23: 38th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3555776.3577735.
Texto completoInformes sobre el tema "Privacy"
Popovic, Ales, H. Jeff Smith, James Y. L. Thong y Sunil Wattal. Information Privacy. MIS Quarterly, mayo de 2017. http://dx.doi.org/10.25300/misq/2019/curations/05292017.
Texto completoKakulla, Brittne. Topical Spotlight: Digital Privacy — Privacy Concerns Remain a Barrier. Washington, DC: AARP Research, agosto de 2021. http://dx.doi.org/10.26419/res.00420.007.
Texto completoGoldfarb, Avi y Catherine Tucker. Privacy and Innovation. Cambridge, MA: National Bureau of Economic Research, junio de 2011. http://dx.doi.org/10.3386/w17124.
Texto completoBortzmeyer, S. DNS Privacy Considerations. RFC Editor, agosto de 2015. http://dx.doi.org/10.17487/rfc7626.
Texto completoWicinski, T., ed. DNS Privacy Considerations. RFC Editor, julio de 2021. http://dx.doi.org/10.17487/rfc9076.
Texto completoLefkovitz, Naomi. NIST Privacy Framework:. Gaithersburg, MD: National Institute of Standards and Technology, 2024. http://dx.doi.org/10.6028/nist.cswp.10.may.
Texto completoKissner, Lea y Dawn Song. Privacy-Preserving Set Operations. Fort Belvoir, VA: Defense Technical Information Center, junio de 2005. http://dx.doi.org/10.21236/ada457144.
Texto completoSeybold, Patricia. DuckDuckGo Respects Our Privacy. Boston, MA: Patricia Seybold Group, junio de 2013. http://dx.doi.org/10.1571/pp06-28-13cc.
Texto completoJiang, S., S. Krishnan y T. Mrugalski. Privacy Considerations for DHCP. RFC Editor, abril de 2016. http://dx.doi.org/10.17487/rfc7819.
Texto completoKrishnan, S., T. Mrugalski y S. Jiang. Privacy Considerations for DHCPv6. RFC Editor, mayo de 2016. http://dx.doi.org/10.17487/rfc7824.
Texto completo